168 research outputs found
Channel training design in full-duplex wiretap channels to enhance physical layer security
In this work, we propose a new channel training (CT) scheme to enhance physical layer security in a full-duplex wiretap channel, where the multi-antenna and full-duplex receiver simultaneously receives the information signal and transmits artificial noise (AN). In order to suppress the self-interference caused by AN, the receiver has to estimate the self-interference channel prior to the data communication phase. In the proposed CT scheme, the receiver transmits limited pilot symbols which are known only to itself, which prevents the eavesdropper from estimating the jamming channel from the receiver to the eavesdropper, hence effectively degrades the eavesdropping capability. Compared with the traditional CT scheme that uses publicly known pilots, the newly proposed secret CT scheme offers significantly better performance when the number of antennas at the eavesdropper is larger than one, e.g., Ne > 1. The optimal power allocation between CT and data/AN transmission at the legitimate transmitter/receiver is determined for the proposed secret CT scheme.ARC Discovery Projects Grant DP15010390
Channel training design in full-duplex wiretap channels to enhance physical layer security
In this work, we propose a new channel training (CT) scheme to enhance physical layer security in a full-duplex wiretap channel, where the multi-antenna and full-duplex receiver simultaneously receives the information signal and transmits artificial noise (AN). In order to suppress the self-interference caused by AN, the receiver has to estimate the self-interference channel prior to the data communication phase. In the proposed CT scheme, the receiver transmits limited pilot symbols which are known only to itself, which prevents the eavesdropper from estimating the jamming channel from the receiver to the eavesdropper, hence effectively degrades the eavesdropping capability. Compared with the traditional CT scheme that uses publicly known pilots, the newly proposed secret CT scheme offers significantly better performance when the number of antennas at the eavesdropper is larger than one, e.g., Ne > 1. The optimal power allocation between CT and data/AN transmission at the legitimate transmitter/receiver is determined for the proposed secret CT scheme.This work was supported by the Australian Research Council’s Discovery Projects (DP150103905)
A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead
Physical layer security which safeguards data confidentiality based on the
information-theoretic approaches has received significant research interest
recently. The key idea behind physical layer security is to utilize the
intrinsic randomness of the transmission channel to guarantee the security in
physical layer. The evolution towards 5G wireless communications poses new
challenges for physical layer security research. This paper provides a latest
survey of the physical layer security research on various promising 5G
technologies, including physical layer security coding, massive multiple-input
multiple-output, millimeter wave communications, heterogeneous networks,
non-orthogonal multiple access, full duplex technology, etc. Technical
challenges which remain unresolved at the time of writing are summarized and
the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication
Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey
This paper provides a comprehensive review of the domain of physical layer
security in multiuser wireless networks. The essential premise of
physical-layer security is to enable the exchange of confidential messages over
a wireless medium in the presence of unauthorized eavesdroppers without relying
on higher-layer encryption. This can be achieved primarily in two ways: without
the need for a secret key by intelligently designing transmit coding
strategies, or by exploiting the wireless communication medium to develop
secret keys over public channels. The survey begins with an overview of the
foundations dating back to the pioneering work of Shannon and Wyner on
information-theoretic security. We then describe the evolution of secure
transmission strategies from point-to-point channels to multiple-antenna
systems, followed by generalizations to multiuser broadcast, multiple-access,
interference, and relay networks. Secret-key generation and establishment
protocols based on physical layer mechanisms are subsequently covered.
Approaches for secrecy based on channel coding design are then examined, along
with a description of inter-disciplinary approaches based on game theory and
stochastic geometry. The associated problem of physical-layer message
authentication is also introduced briefly. The survey concludes with
observations on potential research directions in this area.Comment: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with
arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials,
201
Secret Channel Training to Enhance Physical Layer Security With a Full-Duplex Receiver
This work proposes a new channel training (CT)
scheme for a full-duplex receiver to enhance physical layer
security. Equipped with NB full-duplex antennas, the receiver
simultaneously receives the information signal and transmits
artificial noise (AN). In order to reduce the non-cancellable
self-interference due to the transmitted AN, the receiver has
to estimate the self-interference channel prior to the data
communication phase. In the proposed CT scheme, the receiver
transmits a limited number of pilot symbols which are known
only to itself. Such a secret CT scheme prevents an eavesdropper
from estimating the jamming channel from the receiver to
the eavesdropper, hence effectively degrading the eavesdropping
capability. We analytically examine the connection probability
(i.e., the probability of the data being successfully decoded by the
receiver) of the legitimate channel and the secrecy outage probability
due to eavesdropping for the proposed secret CT scheme.
Based on our analysis, the optimal power allocation between CT
and data/AN transmission at the legitimate transmitter/receiver
is determined. Our examination shows that the newly proposed
secret CT scheme significantly outperforms the non-secret CT
scheme that uses publicly known pilots when the number of
antennas at the eavesdropper is larger than one.ARC Discovery Projects Grant DP15010390
Exploiting Full-duplex Receivers for Achieving Secret Communications in Multiuser MISO Networks
We consider a broadcast channel, in which a multi-antenna transmitter (Alice)
sends confidential information signals to legitimate users (Bobs) in
the presence of eavesdroppers (Eves). Alice uses MIMO precoding to generate
the information signals along with her own (Tx-based) friendly jamming.
Interference at each Bob is removed by MIMO zero-forcing. This, however, leaves
a "vulnerability region" around each Bob, which can be exploited by a nearby
Eve. We address this problem by augmenting Tx-based friendly jamming (TxFJ)
with Rx-based friendly jamming (RxFJ), generated by each Bob. Specifically,
each Bob uses self-interference suppression (SIS) to transmit a friendly
jamming signal while simultaneously receiving an information signal over the
same channel. We minimize the powers allocated to the information, TxFJ, and
RxFJ signals under given guarantees on the individual secrecy rate for each
Bob. The problem is solved for the cases when the eavesdropper's channel state
information is known/unknown. Simulations show the effectiveness of the
proposed solution. Furthermore, we discuss how to schedule transmissions when
the rate requirements need to be satisfied on average rather than
instantaneously. Under special cases, a scheduling algorithm that serves only
the strongest receivers is shown to outperform the one that schedules all
receivers.Comment: IEEE Transactions on Communication
An Overview of Physical Layer Security with Finite-Alphabet Signaling
Providing secure communications over the physical layer with the objective of
achieving perfect secrecy without requiring a secret key has been receiving
growing attention within the past decade. The vast majority of the existing
studies in the area of physical layer security focus exclusively on the
scenarios where the channel inputs are Gaussian distributed. However, in
practice, the signals employed for transmission are drawn from discrete signal
constellations such as phase shift keying and quadrature amplitude modulation.
Hence, understanding the impact of the finite-alphabet input constraints and
designing secure transmission schemes under this assumption is a mandatory step
towards a practical implementation of physical layer security. With this
motivation, this article reviews recent developments on physical layer security
with finite-alphabet inputs. We explore transmit signal design algorithms for
single-antenna as well as multi-antenna wiretap channels under different
assumptions on the channel state information at the transmitter. Moreover, we
present a review of the recent results on secure transmission with discrete
signaling for various scenarios including multi-carrier transmission systems,
broadcast channels with confidential messages, cognitive multiple access and
relay networks. Throughout the article, we stress the important behavioral
differences of discrete versus Gaussian inputs in the context of the physical
layer security. We also present an overview of practical code construction over
Gaussian and fading wiretap channels, and we discuss some open problems and
directions for future research.Comment: Submitted to IEEE Communications Surveys & Tutorials (1st Revision
- …